Showing 9709–9720 of 10358 results
Understand data warehouse developer features of Azure Synapse Analytics
Learn about the language capabilities that are available to create data warehouses in Azure Synapse Analytics.
Understand device management using Microsoft Intune
As part of device management, Intune helps you protect device data, manage policy assignments, ensure proper device access, implement device security rules, and resolve device compliance issues.
Understand factors that influence HPC storage selection in Azure
This module covers various factors that influence HPC storage selection in Azure. We review NFS, file access, directory services, parallel file systems, and hybrid file-access considerations.
Understand how Rust manages memory
Discover the features that make Rust so unique: ownership and borrowing.
Understand how to use packages, variables, and functions in Go
Learn about the basic data types in Go and about how to declare variables, write functions, and use packages.
Understand hybrid data platform on SQL Server 2022
Learn about new major cloud connected capabilities of SQL Server 2022.
Understand Microsoft 365 audit logging and monitoring
Learn about how Microsoft 365 uses comprehensive audit logging and monitoring to support security monitoring, maintain service availability, and meet compliance requirements.
Understand Microsoft 365 cloud architecture
Learn how the architecture of Microsoft 365 implements security and privacy features to protect customers who use Microsoft 365 multi-tenant services.
Understand Microsoft 365 encryption
Learn how Microsoft 365 encrypts data-at-rest and in-transit, securely manages encryption keys, and provides key management options to customers to meet their business needs and compliance obligations.
Understand Microsoft 365 governance
Learn how Microsoft implements organization-wide security and privacy governance to support the secure operation of Microsoft 365 services and maintain compliance with regulatory requirements and customer commitments.
Understand Microsoft 365 identity and access management
Learn how Microsoft 365 implements the principle of Zero Standing Access (ZSA) to protect production environments and customer data using Just-In-Time (JIT) and Just-Enough-Access (JEA).
Understand Microsoft 365 privacy
Learn about Microsoft 365 privacy standards, the reasons we have them in place, and how they differentiate Microsoft in protecting and respecting customer data.